US20100198902A1 - Computing minimal polynomials of radical expressions - Google Patents

Computing minimal polynomials of radical expressions Download PDF

Info

Publication number
US20100198902A1
US20100198902A1 US12/364,533 US36453309A US2010198902A1 US 20100198902 A1 US20100198902 A1 US 20100198902A1 US 36453309 A US36453309 A US 36453309A US 2010198902 A1 US2010198902 A1 US 2010198902A1
Authority
US
United States
Prior art keywords
polynomial
radical
computer
annihilation
roots
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/364,533
Inventor
Xu Yang
Zhouchen Lin
Sijun Liu
Tianjun Ye
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to US12/364,533 priority Critical patent/US20100198902A1/en
Priority to US12/422,315 priority patent/US9122563B2/en
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LIN, ZHOUCHEN, LIU, SIJUN, YANG, XU, YE, TIANJUN
Publication of US20100198902A1 publication Critical patent/US20100198902A1/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations

Abstract

Described is a technology, such as implemented in a computational software program, by which a minimal polynomial is efficiently determined for a radical expression based upon its structure of the radical expression. An annihilation polynomial is found based upon levels of the radical to obtain roots of the radical. A numerical method performs a zero test or multiple zero tests to find the minimal polynomial. In one implementation, the set of roots corresponding to a radical expression is found. The annihilation polynomial is computed by grouping roots of the set according to their conjugation relationship and multiplying factor polynomials level by level. A selection mechanism selects the minimal polynomial based upon the annihilation polynomial's factors.

Description

    BACKGROUND
  • Minimal polynomials are widely used in symbolic computation. Computing the minimal polynomial of a radical expression (or more simply “radical” as used herein) is a basic problem in symbolic computation. Some examples include factorization of polynomials in an algebraic extension field, rationalization of denominators, and simplification of complex expressions.
  • The existing algorithms are all limited to radicals over the ring Z of integer numbers or the field Q of rational numbers.
  • Determining the minimal polynomial of radicals over a ring is a well known question for problems related to algebraic extension. One conventional method finds an annihilation polynomial, factors the polynomial, and then finds the minimal polynomial from the factors. However, for many types of radicals, computational software programs that use known methods cannot find the results and/or fail, and are computationally expensive (that is, relatively slow) particularly for complex radicals.
  • SUMMARY
  • This Summary is provided to introduce a selection of representative concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used in any way that would limit the scope of the claimed subject matter.
  • Briefly, various aspects of the subject matter described herein are directed towards a technology by which a minimal polynomial is efficiently determined for a radical expression based upon the structure of the radical expression. To this end, an annihilation polynomial is found based upon levels of the radical (level substitution) to obtain roots of the radical. The roots are used to compute an annihilation polynomial (via hierarchical cancellation). A numerical method performs a zero test or multiple zero tests to find the minimal polynomial.
  • In one aspect, a set of roots corresponding to a radical expression is found. The annihilation polynomial is computed by grouping roots of the set according to their conjugation relationship and multiplying factor polynomials level by level. A selection mechanism selects the minimal polynomial based upon the factors corresponding to the annihilation polynomial.
  • Other advantages may become apparent from the following detailed description when taken in conjunction with the drawings.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The present invention is illustrated by way of example and not limited in the accompanying figures in which like reference numerals indicate similar elements and in which:
  • FIG. 1 is a block diagram showing example components for computing minimal polynomials of radical expressions.
  • FIG. 2 is a flow diagram showing example steps taken to compute the minimal polynomial of a radical expression that is a ring radical.
  • FIG. 3 is a flow diagram showing example steps taken to compute the minimal polynomial of a radical expression that is a division of two ring radicals.
  • FIG. 4 shows an illustrative example of a computing environment into which various aspects of the present invention may be incorporated.
  • DETAILED DESCRIPTION
  • Various aspects of the technology described herein are generally directed towards finding an annihilation polynomial for radicals over a ring using a level permutation group method, along with a numerical method to compute a polynomial and test the roots of polynomials by symbolic computation. When used in a computational software program, these methods find results for many types of radicals that known computational software programs cannot find or fail to find, and are computationally much faster than known computational software programs, including for complex radicals.
  • In one aspect, this technology provides an efficient hierarchical elimination mechanism (algorithm) for computing the annihilation polynomials of radical expressions over a general ring or field. One such algorithm also works for radical expressions with variables, such as expressions over Z[x, y . . . z] or Q[x, y . . . z]. By factoring the annihilation polynomials, the minimal polynomials can be obtained.
  • It should be understood that any of the examples described herein are non-limiting examples. As such, the present invention is not limited to any particular embodiments, aspects, concepts, structures, functionalities or examples described herein. Rather, any of the embodiments, aspects, concepts, structures, functionalities or examples described herein are non-limiting, and the present invention may be used in various ways that provide benefits and advantages in computing in general.
  • FIG. 1 shows various aspects related to finding an annihilation polynomial by using a level permutation group based on the structure of radicals. In the example implementation of FIG. 1, a computational software program 102 includes logic 104 for computing a minimal polynomial of a given radical expression, or radical 106. To this end, the logic 104 includes an algorithm 108 (described below with reference to FIGS. 2 and 3), including a level finding mechanism 110 that finds the levels of the radical 106, and a numerical method mechanism 112.
  • In general, the level finding mechanism computes a root set 114 and root tree structure 116. Further, as will be understood, for radicals over Q or Z, a known (classical) method is modified through the numerical method mechanism 112. To this end, the root tree structure 116 is expanded via an expansion mechanism 120 into a computed annihilation polynomial 122, which is then factored by a factor mechanism 124 (e.g., using known algorithms) into a set of factors 126. A selection mechanism selects the minimal polynomial from the factors.
  • Turning to the various mechanisms and computed data, radicals over a ring (field) X are defined via the following recursion:
      • 1. x is a radical, ∀xεX;
      • 2. if R1 and R2 are radicals, so are
        m√{square root over (R1)}, R0=R1+R2, R0=R1−R2, R0=R1×R2 and R0=R1/R2, where m is a positive integer.
  • If a radical R is generated by the above rules (except using R0=R1/R2), then it is called a ring radical. Radicals over Z and Q form a major class of algebraic numbers.
  • As used herein, a “level” is a concept related to the structure of a radical. Intuitively, the level of a component of a radical is the number of nested radical signs over it. More particularly, given a radical R, the levels of its components are defined via the following recursion:
  • 1. the level of R itself is defined as 0;
    2. if R0 is decomposed in either of the following ways:

  • R 0 =R 1 +R 2 , R 0 =R 1 −R 2 , R 0 =R 1 ×R 2 or R 0 =R 1 /R 2
  • where R1 and R2 are radicals, then the levels of R1 and R2 are the same as R0.
    3. if R0=m√{square root over (R1)}, then the level of R1 is that of R0 plus 1.
  • Radicals are defined herein to be nested radicals or the results of nested radicals after arithmetic operations. If the ring to which the items in these nested radical belong is known, the radicals are said to be radicals over the ring. For example,
  • 5 + 2 3 + 2 2 3 - 3 4 3 × 6
  • are radicals over Q and
  • 2 y 5 + 3 x 5 3
  • are radicals over Q[x, y].
  • To get an image of radicals, the items under i radical are considered to be at the (i+1)th-level. Taking
  • 7 5 + 2 3 + 2 2 + 3 + 5 3 - 3 4 3 × 6
  • as an example, the first level (with no higher radical) are items from the above example are:
  • 7 , 5 + 2 , 3 + 2 2 + 3 + 5 3 , 3 4 3 , 6 .
  • The second level comprises items under one radical, which are
  • 5 , 2 , 3 , 2 , 2 + 3 + 5 , 3 4 , 6.
  • These can also be obtained by collecting the first level of items in the first level. As can be seen, the third level comprises 2, 2, √{square root over (3+√{square root over (5)})}, the fourth level comprises 3, √{square root over (5)} and the fifth level is 5.
  • These primitive items have certain level properties, including that a first level property is that the (i+1)th level can be obtained by collecting the first levels of items in the ith level. A second level property is that every item in the ith level either belongs to the ring, or is a rational power of results after arithmetic operations of items in the (i+1)th level. By the first property the levels of a radical are found by the level finding mechanism 110. The second property is used to find the annihilation polynomial as described below.
  • To find a root set 114, the level finding mechanism 110 aims to find the roots of the annihilation polynomial 122 of a given radical a (input radical 106), such that the polynomial is in X[θ]. The root set 114 is obtained recursively as described hereinafter. A general idea is to find conjugate roots at every level, so that the immediate radical signs over that level can be removed.
  • Consider that the highest level in α is n. Starting from the (n−1)-th level, the root set is initialized to be An={α}. For each element αq (i+1) in Ai+1, consider its different primitive items at level i that do not belong to X. By the second property above, they can be written as:
  • β p m p , p = 1 , , k i .
  • Then αq i+1 generates πp=1 k i mp roots in the next level root set Ai, by replacing its i-th level primitive items
  • β p m p with β p m p ɛ m p r p , r p = 0 , 1 , , m p - 1 , p = 1 , , k i ,
  • where
  • ɛ m = 2 π j m and j = - 1 .
  • Deleting the duplicated elements in the set of newly generated roots obtains Ai. The above recursion stops when i=0, and A0 is the set of complete roots.
  • The roots in Ai, which are generated from the same element of Ai+1 by the above replacement, are referred to as the depth-i conjugate roots. Then the root set may be represented in the tree structure 116 by the depth and the conjugation:
  • α { α 1 { α 11 { α 1 k { α m { α m 1 { α m l {
  • where the elements at depth i of the above tree are the roots in An−i (assuming that α is at depth 0).
  • By way of example, consider a radical over ringZ[x]:
  • 1 - 5 + x - 5 3 ;
  • its highest level is 2. Thus, the initial root set is A2={r}. The different 1-st level primitive items of a that do not belong to Z[x] are: √{square root over (5)}. Thus, the depth-1 root set is:
  • A 1 = { 1 - 5 + x - 5 3 , 1 - 5 + x + 5 3 } { α 1 , α 2 }
  • where α1 and α2 are depth-1 conjugate roots as they are both generated from a.
  • Next, for α1 the different 0-th level primitive items that do not belong to Z[x] are:
  • 1 - 5 and x - 5 3 .
  • Thus, α1 generates the following depth-2 conjugate roots in A0:
  • { 1 - 5 + x - 5 3 , 1 - 5 + x - 5 3 ɛ 3 , 1 - 5 + x - 5 3 ɛ 3 2 , - 1 - 5 + x - 5 3 , - 1 - 5 + x - 5 3 ɛ 3 , - 1 - 5 + x - 5 3 ɛ 3 2 } .
  • Similarly, the conjugate roots in A0 generated by α2 can also be found. Thus:
  • A 0 = { 1 - 5 + x - 5 3 , 1 - 5 + x - 5 3 ɛ 3 , 1 - 5 + x - 5 3 ɛ 3 2 , - 1 - 5 + x - 5 3 , - 1 - 5 + x - 5 3 ɛ 3 , - 1 - 5 + x - 5 3 ɛ 3 2 , 1 + 5 + x + 5 3 , 1 + 5 + x + 5 3 ɛ 3 , 1 + 5 + x + 5 3 ɛ 3 2 , - 1 + 5 + x + 5 3 , - 1 + 5 + x + 5 3 ɛ 3 , - 1 + 5 + x + 5 3 ɛ 3 2 }
  • A radical is either a ring radical, or can be written as the division of two ring radicals. Thus, only two forms of radicals need be considered, as set forth below:
  • Theorem: Given the root set A0
      • 1. If the radical α is a ring radical, then f(θ)=πα q εA 0 (θ−αq) is the annihilation polynomial of α in X[θ];
      • 2. If
  • α = γ β ,
  • where both γ and β are ring radicals, then the root set can be expressed as
  • A 0 = { γ q β q | γ q and β q
  • are both ring radicals, q=1, . . . , K} and the annihilation polynomial in X[θ] is f(θ)=πq=1 Kqθ−γq).
  • Turning to expanding the annihilation polynomial, as described above, the roots in A0 can be grouped according to their conjugate relationship. Consider that there are N groups A0,k, k=1, . . . , N. Then the annihilation polynomial f(θ)=πk=1 Nfk(θ), where fk(θ)=πα q εA 0,k (θ−αq). As the radical signs of the 0-th level primitive items are removed when fk(θ) is expanded (because it is a symmetric polynomial of these conjugate roots), when multiplying among the 0-th level primitive items, the process only needs to check whether the radical signs of the chosen primitive items can be removed after multiplying them. This checking operation is very fast; for every primitive item of the form
  • β m ,
  • it appears p·m times in the chosen primitive items, where p is a nonnegative integer. If this criterion is not satisfied, the multiplication is not performed. Otherwise, the multiplication result is added to an accumulation buffer for fk(θ).
  • After expanding all fk(θ), k=1, . . . , N, they are further grouped according to the conjugate relationship at the depth (n−1) of the tree. Then the above testing is also performed when expanding the product of fk(θ) in each group, whereby the 1-st level radical signs will removed. This procedure goes on until depth 1 of the tree. Then the completely expanded annihilation polynomial f(θ) is obtained.
  • By way of an example, consider the radical √{square root over (1−√{square root over (5)})}+
  • 1 - 5 + x - 5 3 .
  • The tree structure of the root sets is as follows:
  • 1 - 5 + x - 5 3 { 1 - 5 + x - 5 3 { 1 - 5 + x - 5 3 1 - 5 + x - 5 3 ɛ 3 1 - 5 + x - 5 3 ɛ 3 2 - 1 - 5 + x - 5 3 - 1 - 5 + x - 5 3 ɛ 3 - 1 - 5 + x + 5 3 ɛ 3 2 1 + 5 + x + 5 3 { 1 + 5 + x + 5 3 1 + 5 + x + 5 3 ɛ 3 1 + 5 + x + 5 3 ɛ 3 2 - 1 + 5 + x + 5 3 - 1 + 5 + x + 5 3 ɛ 3 - 1 + 5 + x + 5 3 ɛ 3 2
  • When computing f1(θ) using the first group of depth-2 roots, multiplications such as:
  • 1 - 5 1 - 5 x - 5 3 ɛ 3 2 x - 5 3 x - 5 3 ɛ 3 θ
  • are performed and also stored because the level-0 radical signs are removed. In this way,
  • f 1 ( θ ) = θ 6 + 3 ( 5 - 1 ) θ 4 + ( 2 5 - 2 x ) θ 3 - 6 ( - 3 + 5 ) θ 2 + ( 6 ( - 5 + 5 ) + 6 ( - 1 + 5 ) x ) y + x 2 - 2 5 x + 8 5 - 11. Similarly , f 2 ( θ ) = θ 6 - 3 ( 5 + 1 ) θ 4 + ( - 2 5 - 2 x ) θ 3 + 6 ( 3 + 5 ) θ 2 + ( - 6 ( 5 + 5 ) - 6 ( 1 + 5 ) x ) θ + x 2 - 2 5 x - 8 5 - 11. Therefore , f ( θ ) = f 1 ( θ ) f 2 ( θ ) = - 199 + 160 x - 42 x 2 + x 4 + ( 180 - 228 x + 60 x 2 - 12 x 3 ) θ + ( 804 - 120 x - 180 x 2 ) θ 2 + ( - 880 + 228 x - 4 x 3 ) θ 3 + ( - 150 + 60 x + 18 x 2 ) θ 4 + ( 120 - 216 x ) θ 5 + ( 30 + 6 x 2 ) θ 6 - 120 θ 7 - 4 × θ 9 - 6 θ 10 + θ 12 .
  • With respect to computing the minimal polynomial, after obtaining the annihilation polynomial, the annihilation polynomial can be factored using known algorithms to select the minimal polynomial by substituting the radical and performing a zero test. However, it is usually very difficult to do such a zero test by symbolic computation, and thus numerical methods are employed as described herein. For a radical over Z or Q, the numerical value of the radical is computed and then checked as to whether it fulfills a factored polynomial at a high precision. For a radical over Z[x, y, . . . , z] or Q[x, y, . . . , z], the values of x, y, . . . , z may be randomly selected multiple times, and then the numerical zero test performed.
  • FIGS. 2 and 3, representing the algorithm below, summarize the logic 104:
  • For a radical α over the ring Z, Q, Z[x], Z[x, y, . . . z],Q[x], or Q[x, y, . . . z],
    Normalize α to make it a radical over Z, Z[x] or Z[x, y, . . . z] (step 202).
    If (α is a ring radical) (step 204, else if not, to step 300 of FIG. 3)
    {
    Find the levels, get the root set {α1, . . . , αm} and root tree structure (step
    205).
    Expand f(θ) = Πi=1 m (θ − αi) with root tree structure (step 206).
    Factor f(θ) and get factors list {P1(θ), . . . , Pk(θ)} (step 207).
    If (α is radical over Z) (step 208)
    {
    find approximate value of α, do zero test and select minimal
    polynomial from factors list (step 210).
    }
    Else
    {
    set the value of variables randomly and do zero test multiple times,
    then select minimal polynomial from factors list (step 212).
    }
    }
    else if (α is division of two ring radicals,
    α = γ β ) (step 300 of FIG. 3).
    {
    Find the levels, get the roots set
    { γ 1 β 1 , , γ m β m } and roots tree structure (step 305).
    Expand f(θ) = Πi=1 miθ − γi) with root tree structure (step 306).
    Factor f(θ) and get factors list {P1(θ), . . . , Pk(θ)}(step 307).
    If (α is radicals over Z) (step 308)
    {
    find approximate value of α with high precision, do zero test and select
    minimal polynomial from factors list (step 310).
    }
    Else
    {
    set the value of variables randomly and do zero test multiple times,
    then select minimal polynomial from factors list (step 312).
    }
    }
  • Step 214 or 314 represent outputting the resulting minimal polynomial, e.g., to another component of the computer software program for further processing or outputting to the user.
  • Exemplary Operating Environment FIG. 4 illustrates an example of a suitable computing and networking environment 400 on which the examples of FIGS. 1-3 may be implemented. The computing system environment 400 is only one example of a suitable computing environment and is not intended to suggest any limitation as to the scope of use or functionality of the invention. Neither should the computing environment 400 be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in the exemplary operating environment 400.
  • The invention is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well known computing systems, environments, and/or configurations that may be suitable for use with the invention include, but are not limited to: personal computers, server computers, hand-held or laptop devices, tablet devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
  • The invention may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, and so forth, which perform particular tasks or implement particular abstract data types. The invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in local and/or remote computer storage media including memory storage devices.
  • With reference to FIG. 4, an exemplary system for implementing various aspects of the invention may include a general purpose computing device in the form of a computer 410. Components of the computer 410 may include, but are not limited to, a processing unit 420, a system memory 430, and a system bus 421 that couples various system components including the system memory to the processing unit 420. The system bus 421 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus also known as Mezzanine bus.
  • The computer 410 typically includes a variety of computer-readable media. Computer-readable media can be any available media that can be accessed by the computer 410 and includes both volatile and nonvolatile media, and removable and non-removable media. By way of example, and not limitation, computer-readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by the computer 410. Communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of the any of the above may also be included within the scope of computer-readable media.
  • The system memory 430 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 431 and random access memory (RAM) 432. A basic input/output system 433 (BIOS), containing the basic routines that help to transfer information between elements within computer 410, such as during start-up, is typically stored in ROM 431. RAM 432 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 420. By way of example, and not limitation, FIG. 4 illustrates operating system 434, application programs 435, other program modules 436 and program data 437.
  • The computer 410 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only, FIG. 4 illustrates a hard disk drive 441 that reads from or writes to non-removable, nonvolatile magnetic media, a magnetic disk drive 451 that reads from or writes to a removable, nonvolatile magnetic disk 452, and an optical disk drive 455 that reads from or writes to a removable, nonvolatile optical disk 456 such as a CD ROM or other optical media. Other removable/non-removable, volatile/nonvolatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like. The hard disk drive 441 is typically connected to the system bus 421 through a non-removable memory interface such as interface 440, and magnetic disk drive 451 and optical disk drive 455 are typically connected to the system bus 421 by a removable memory interface, such as interface 450.
  • The drives and their associated computer storage media, described above and illustrated in FIG. 4, provide storage of computer-readable instructions, data structures, program modules and other data for the computer 410. In FIG. 4, for example, hard disk drive 441 is illustrated as storing operating system 444, application programs 445, other program modules 446 and program data 447. Note that these components can either be the same as or different from operating system 434, application programs 435, other program modules 436, and program data 437. Operating system 444, application programs 445, other program modules 446, and program data 447 are given different numbers herein to illustrate that, at a minimum, they are different copies. A user may enter commands and information into the computer 410 through input devices such as a tablet, or electronic digitizer, 464, a microphone 463, a keyboard 462 and pointing device 461, commonly referred to as mouse, trackball or touch pad. Other input devices not shown in FIG. 4 may include a joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 420 through a user input interface 460 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB). A monitor 491 or other type of display device is also connected to the system bus 421 via an interface, such as a video interface 490. The monitor 491 may also be integrated with a touch-screen panel or the like. Note that the monitor and/or touch screen panel can be physically coupled to a housing in which the computing device 410 is incorporated, such as in a tablet-type personal computer. In addition, computers such as the computing device 410 may also include other peripheral output devices such as speakers 495 and printer 496, which may be connected through an output peripheral interface 494 or the like.
  • The computer 410 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 480. The remote computer 480 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 410, although only a memory storage device 481 has been illustrated in FIG. 4. The logical connections depicted in FIG. 4 include one or more local area networks (LAN) 471 and one or more wide area networks (WAN) 473, but may also include other networks. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet.
  • When used in a LAN networking environment, the computer 410 is connected to the LAN 471 through a network interface or adapter 470. When used in a WAN networking environment, the computer 410 typically includes a modem 472 or other means for establishing communications over the WAN 473, such as the Internet. The modem 472, which may be internal or external, may be connected to the system bus 421 via the user input interface 460 or other appropriate mechanism. A wireless networking component 474 such as comprising an interface and antenna may be coupled through a suitable device such as an access point or peer computer to a WAN or LAN. In a networked environment, program modules depicted relative to the computer 410, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation, FIG. 4 illustrates remote application programs 485 as residing on memory device 481. It may be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
  • An auxiliary subsystem 499 (e.g., for auxiliary display of content) may be connected via the user interface 460 to allow data such as program content, system status and event notifications to be provided to the user, even if the main portions of the computer system are in a low power state. The auxiliary subsystem 499 may be connected to the modem 472 and/or network interface 470 to allow communication between these systems while the main processing unit 420 is in a low power state.
  • CONCLUSION
  • While the invention is susceptible to various modifications and alternative constructions, certain illustrated embodiments thereof are shown in the drawings and have been described above in detail. It should be understood, however, that there is no intention to limit the invention to the specific forms disclosed, but on the contrary, the intention is to cover all modifications, alternative constructions, and equivalents failing within the spirit and scope of the invention.

Claims (20)

1. In a computing environment, a method comprising, determining levels of a radical expression, using the levels to find roots of an annihilation polynomial, factoring the annihilation polynomial into factors, and selecting a minimal polynomial based upon the factors.
2. The method of claim 1 wherein determining the levels of the radical expression comprises recursively processing levels into a root set for each level.
3. The method of claim 2 wherein a plurality of root sets are provided, and further comprising constructing a root structure corresponding to the root sets.
4. The method of claim 3 wherein using the levels to find roots of an annihilation polynomial comprises performing an expansion based upon the roots into expanded results, and grouping the expanded results into the annihilation polynomial based upon the root structure.
5. The method of claim 4 wherein performing the expansion comprises determining whether the radical expression corresponds to a ring radical or a division of two ring radicals.
6. The method of claim 1 further comprising determining whether the radical expression is a radical over a ring of integer numbers.
7. The method of claim 1 further comprising outputting the minimal polynomial as a result.
8. In a computing environment, a system comprising, a level finding mechanism that finds a set of roots corresponding to a radical expression, an expansion mechanism that computes an annihilation polynomial by grouping roots of the set according to their conjugation relationship and multiplying factor polynomials level by level, and a selection mechanism that selects a minimal polynomial based upon factors corresponding to the annihilation polynomial.
9. The system of claim 8 wherein the expand mechanism processes a root tree structure into the annihilation polynomial.
10. The system of claim 8 wherein the level finding mechanism, the expand mechanism and the selection mechanism are incorporated into a computational software program.
11. One or more computer-readable media having computer-executable instructions, which when executed perform steps, comprising, performing level substitution to obtain roots of a radical expression, and performing hierarchical cancellation based upon the roots to compute an annihilation polynomial corresponding to the radical expression.
12. The one or more computer-readable media of claim 11 having further computer-executable instructions comprising selecting a minimal polynomial based on factors computed from the annihilation polynomial.
13. The one or more computer-readable media of claim 11 having further computer-executable instructions comprising normalizing the radical expression.
14. The one or more computer-readable media of claim 11 having further computer-executable instructions comprising determining whether the radical expression is a ring radical, and if so, wherein performing hierarchical cancellation includes expanding root-based annihilation polynomials into the annihilation polynomial.
15. The one or more computer-readable media of claim 14 having further computer-executable instructions comprising, determining whether the radical expression is a ring over integers, and if so, selecting a minimal polynomial from a set of factors by finding an approximate value corresponding to the radical expression and performing a zero test.
16. The one or more computer-readable media of claim 14 having further computer-executable instructions comprising determining whether the radical expression is a ring over integers, and if not, selecting a minimal polynomial from a set of factors by randomly setting variable values and performing a plurality of zero tests.
17. The one or more computer-readable media of claim 11 having further computer-executable instructions comprising determining whether the radical expression is a division of two ring radicals, and if so, wherein performing hierarchical cancellation includes expanding divided root-based annihilation polynomials into the annihilation polynomial.
18. The one or more computer-readable media of claim 17 having further computer-executable instructions comprising determining whether the radical expression is a ring over integers, and if so, selecting a minimal polynomial from a set of factors by finding an approximate value corresponding to the radical expression and performing a zero test.
19. The one or more computer-readable media of claim 17 having further computer-executable instructions comprising determining whether the radical expression is a ring over integers, and if not, selecting a minimal polynomial from a set of factors by randomly setting variable values and performing a plurality of zero tests.
20. The one or more computer-readable media of claim 11 having further computer-executable instructions comprising outputting results corresponding to a minimal polynomial.
US12/364,533 2009-02-03 2009-02-03 Computing minimal polynomials of radical expressions Abandoned US20100198902A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/364,533 US20100198902A1 (en) 2009-02-03 2009-02-03 Computing minimal polynomials of radical expressions
US12/422,315 US9122563B2 (en) 2009-02-03 2009-04-13 Computing minimal polynomials

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US12/364,533 US20100198902A1 (en) 2009-02-03 2009-02-03 Computing minimal polynomials of radical expressions

Publications (1)

Publication Number Publication Date
US20100198902A1 true US20100198902A1 (en) 2010-08-05

Family

ID=42398580

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/364,533 Abandoned US20100198902A1 (en) 2009-02-03 2009-02-03 Computing minimal polynomials of radical expressions

Country Status (1)

Country Link
US (1) US20100198902A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100262643A1 (en) * 2009-02-03 2010-10-14 Microsoft Corporation Computing minimal polynomials

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5535140A (en) * 1993-01-22 1996-07-09 Canon Kabushiki Kaisha Polynominal-set deriving apparatus and method
US5539755A (en) * 1992-05-19 1996-07-23 U.S. Philips Corporation Method and apparatus for decoding an error protected block of extended data
US6701028B1 (en) * 2000-01-11 2004-03-02 Applied Materials, Inc. Method and apparatus for fast signal convolution using spline kernel
US20060195766A1 (en) * 2001-11-21 2006-08-31 Kabushiki Kaisha Toshiba Semiconductor memory device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5539755A (en) * 1992-05-19 1996-07-23 U.S. Philips Corporation Method and apparatus for decoding an error protected block of extended data
US5535140A (en) * 1993-01-22 1996-07-09 Canon Kabushiki Kaisha Polynominal-set deriving apparatus and method
US6701028B1 (en) * 2000-01-11 2004-03-02 Applied Materials, Inc. Method and apparatus for fast signal convolution using spline kernel
US20060195766A1 (en) * 2001-11-21 2006-08-31 Kabushiki Kaisha Toshiba Semiconductor memory device
US7644342B2 (en) * 2001-11-21 2010-01-05 Kabushiki Kaisha Toshiba Semiconductor memory device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100262643A1 (en) * 2009-02-03 2010-10-14 Microsoft Corporation Computing minimal polynomials
US9122563B2 (en) * 2009-02-03 2015-09-01 Microsoft Technology Licensing, Llc Computing minimal polynomials

Similar Documents

Publication Publication Date Title
Page et al. A practical implementation of the factoring theorem for network reliability
Mahzoon et al. PolyCleaner: clean your polynomials before backward rewriting to verify million-gate multipliers
US8181133B2 (en) Combinational equivalence checking for threshold logic circuits
US8640065B2 (en) Circuit verification using computational algebraic geometry
van Der Hoeven et al. Sparse polynomial interpolation in practice
JP6310345B2 (en) Privacy protection device, privacy protection method, and database creation method
US7447670B1 (en) Methods for monitoring conflicts in inference systems
CN113094746A (en) High-dimensional data publishing method based on localized differential privacy and related equipment
US20130151565A1 (en) Arithmetic node encoding for tree structures
Crandall et al. The twenty-fourth Fermat number is composite
US8335757B2 (en) Extracting patterns from sequential data
Keti et al. Deep holes in Reed–Solomon codes based on Dickson polynomials
JP2000235507A (en) Device and method for designing reliability of system and recording medium recording software for designing system reliability
Keim et al. Polynomial formal verification of multipliers
Harrison et al. High performance rearrangement and multiplication routines for sparse tensor arithmetic
US20100198902A1 (en) Computing minimal polynomials of radical expressions
US8942968B2 (en) Analysis support computer product, apparatus, and method
Crochemore et al. New simple efficient algorithms computing powers and runs in strings
Bakoev Fast computing the algebraic degree of Boolean functions
Stanimirovic et al. Block Method for Convex Polygon Triangulation
US20200195416A1 (en) Efficient computation of univariate statistical moments for side channel vulnerability evaluation
Bernasconi et al. On the error resilience of ordered binary decision diagrams
CN107544943B (en) Partial frequency point calculation method and device based on FFT library function
US9122563B2 (en) Computing minimal polynomials
Mutzel et al. Computing optimal embeddings for planar graphs

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:YANG, XU;LIN, ZHOUCHEN;LIU, SIJUN;AND OTHERS;REEL/FRAME:022974/0875

Effective date: 20090131

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0509

Effective date: 20141014